Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Identity Management in Cloud Computing

2013

Cloud computing offers a rich set of services by pay per use basis. The features and technology offered by various providers created a great competitive market for the business. The various security issues are attracting attention, one of which is identity and privacy of the cloud user. Users are varied about the privacy of information which they have given to the provider at the time of registration. We present an analysis of various identity management systems and proposing a simple trust based scheme for a cloud computing application and service.

International Journal of Computer Applications (0975 – 8887) Volume 63– No.11, February 2013 Identity Management in Cloud Computing Rizwana Shaikh M. Sasikumar SIES Graduate School of Technology, Nerul, Navi Mumbai, Center for Development of Advanced Computing, Kharghar,Navi Mumbai ABSTRACT Cloud computing offers a rich set of services by pay per use basis. The features and technology offered by various providers created a great competitive market for the business. The various security issues are attracting attention, one of which is identity and privacy of the cloud user. Users are varied about the privacy of information which they have given to the provider at the time of registration. We present an analysis of various identity management systems and proposing a simple trust based scheme for a cloud computing application and service. General Terms Cloud Computing, Identity, Identity Management, Trust. Keywords Cloud Computing, Identity, Identity management System, Trust. 1. INTRODUCTION Cloud Computing is a type of computing infrastructure that consists of a collection of inter-connected computing nodes, servers, and other hardware as well as software services and applications that are dynamically provisioned among competing users. Services are delivered over the Internet or private networks, or their combination. The cloud services are accessed over these networks based on their availability, performance, capability, and Quality of Service (QoS) requirements. The focus is to deliver reliable, secure, faulttolerant, sustainable and scalable services, platforms and infrastructures to the end-users. These systems have goals of providing virtually unlimited computing and storage and hiding the complexity of large-scale distributed computing from users. Thus cloud computing is a new way of delivering services. Identity management (IDM) is defined as an integrated concept of process, policies and technologies that enables authoritative source to accurately identify entities and control the use of information between them. Identities corresponds to the entities and consisting of attributes and identifiers. An identity management describes the management of individual identities, their authentication, authorization, roles, and privileges within or across system. An identity management system is the information system that can be used for Identity management. Various components of the system are; Directory services, Access management, Password administration including single sign-on, Identity authentication, User provisioning, Compliance auditing, Role management and Federated identities, which enables the creation of virtual communities of customers and partners that can conduct business on different websites with a single login. The technologies used for implementing IDM are as follows;  Active Directory is a directory service created by Microsoft for Windows domain networks.  Security Assertion Markup Language is an XML-based open standard for exchanging authentication and authorization data between security domains, that is, between an identity provider and a service provider  Single sign-on is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.  OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital identities. Even though various technologies are available, there are various challenges in an identity management system. They are;    Trusting a partner to authenticate its own users is not challenging only if that partner has solid security and user-management practices. Implementing the technology commonly requires customization to integrate applications and develop user interfaces. The most difficult task is encouragement of pervasive adoption of IDM among various organizations as explained by the author in [1]. Various cloud users are accessing and using cloud services. These users are identified by their credentials like username, password, and certificates of user, Biometric or SSN etc. These credentials vary depending on the cloud provider’s identity management system. Some have provisions for only username and password, some with other credentials. These identities are stored at separate, private and confidential storage in the cloud environment. The stored information of the user can be tampered or modified by malicious or unauthorized users. Storing and managing of identities is very crucial security concerns form cloud provider side, to gain confidence form the user and also to the cloud user to increase their trust towards a cloud provider. Therefore a strong identity management system for a cloud application is the attracted by various organizations. Here we are proposing a trust based system to achieve user confidence for a cloud service. Paper is organized as follows. Section 2 deals with related research in identity management, section 3 is used to 17 International Journal of Computer Applications (0975 – 8887) Volume 63– No.11, February 2013 propose the trust based scheme and section 4 concludes the paper. and accessed by their respective users. Therefore the concept of federated IDM is essential to fully understand the user requirements in a distributed cloud computing environment. 2. Related Research The area of IDM has attracted attention by various authors in the literature. Some of them are discussed here as follows. An inclusive IDM (IIDM) perspective presented by the author in [2] implies a need for a systematic approach towards integrating usability and accessibility concerns in the design and development process. IIDM should define itself as an interdisciplinary and even trans-disciplinary approach that not simply aggregates established knowledge from various disciplines but can pave the way for new ideas, approaches and technical solutions. To minimize the display of personal data, the psychic identity will be used as discussed in [3]. It has a photograph of the holder, some kind of card number for administrative reasons and the information that its interrogator is entitled to see. It provides only those unique identifying numbers relevant to the questioner. The concept of virtual reality is used for privacy and to minimize the impact of data breaches. An intermediary model between the network-side identity federation model and the client-centric identity approach is proposed in [4]. This model is based on partially blind signature scheme. In this model, only the management of the identity federation links is transferred to the user’s device and the actual authentication of the user is performed by Identity Providers (IdP) in the network. This model gives the users a full control on the identity federation links while preserving the trust relationships established between Service Providers and IdPs that enable SPs to accept authentication claims provided by the IdPs. Identity selector concept also implemented here with managed and self issued cards. In [5], a pseudonym-based signature scheme is proposed to construct practical delegation solutions for universal identity management. The pseudonym-based signature scheme provides anonymous proof of possession of credentials to protect user’s privacy. In [6], author proposed a dynamic privacy-enhanced federated identity management solution for cooperation, on-demand resources provisioning and delegation in cloud computing scenarios, preserving the user’s privacy. It extends SAMLv2, defining an enhanced privacy module, a new reputation protocol, and considering the Enhanced Client Profile, in order to provide an efficient identity management and access control, as well as dynamic, autonomic, and user-centric establishment of cloud federations. Experience Based Access Management as given in [8] promises broad applicability across many domains. Lots of research areas can be explored by understanding challenges in their implementation. Most federated identity management systems are limited by users’ ability to choose only one identity provider per service session. A linking service proposed in [9] lets users securely link their various identity provider accounts, enabling the system to aggregate attributes from multiple authoritative sources automatically without requiring users to authenticate separately to each IdP. An IDM suitable for a single system is not desirable most of the time, since services from multiple providers can be shared 2.1 Federated IDM Federation is an identity management model in which various tasks associated with an identity transaction, are distributed among the actors involved in the transaction. Actors must be confident that the others performed their assigned tasks with appropriate diligence. The typical example of a federated transaction is Web single sign-on (SSO). In [10] author defined assurance as the degree of confidence an relying party can ascribe to the assertions made by some Identity Provider with respect to users’ identity attributes. Many assurance frameworks were discussed and analyzed along with protocols. Identity management and privacy is discussed in terms of price discrimination by the authors [11]. Some control over how user identities and attributes are established and revealed to others becomes a tool for privacy protection and balancing of information hiding and sharing economically. Privacy enhancing strategies that aim to provide anonymity and pseudonymity are discussed. Unitary and composite approaches of providing identities were discussed by the author in [12]. By discussing special purpose and general purpose identity systems author has proposed the solution that is based on the combined approach of unitary and composite identities. In a cloud computing environment Identity management is the essential activity as large number of customers and services are used. Many cloud users are accessing and using cloud services. Therefore storing and managing of identities is very crucial security concerns and requires a trust based solution as discussed in the next section. 3. Proposed System In a cloud computing system federated Identity management concept is essential along with the strong and trusted Identity management system itself. Identity management systems discussed in the previous section is not sufficient for the cloud environment. A trust based solution can be proposed as follows. New cloud user Id Request Identity Id Provisioning Identity Cryptosystem Encrypt/Decrypt Figure 1 IDM for a Cloud Service The various components are; 1) Identity Provisioning: At the time of new user service request, user is allowed to access and fill provisioning form which includes name, password etc. Along with that an identity is created based on combination of 18 International Journal of Computer Applications (0975 – 8887) Volume 63– No.11, February 2013 2) 3) numbers and character in a random fashion. The trust value associated with it can be calculated based on size, character combination with numbers and any special symbols used. Depending on the trust value user can select their identity with their own choice. The system is responsible for checking the duplicates. Cryptosystem: The identities and related user credentials can be stored at some isolated location or storage. The storage should be created and maintained only by the authorized user or administrator. To increase the strength of the stored identity and identity system, it is required to maintain the strength of stored information. It should be stored and accessed by an administrator as a cryptosystem, which requires cryptographic keys and algorithms for using it. Communication Channel: Created identities are passed in the encrypted form to the user while accessing the service, by the cloud provider’s identity management system. Communication Security Strength depends on Strength of communication encryption key for passing identities to users, and Strength of used standard like soap message encryption strength. The system itself is responsible for encryption and decryption without involving the user. 3.1 Federated IDM In a cloud computing environment federated Identity concept is essential as many cloud providers share their services to fulfill their respective customer needs. Therefore managing of various users identities in such environment is difficult and challenging task. Existing system already had the concept of federation, but it is for non-cloud applications. For cloud application a trust based federated identity management can be proposed as follows. The concept of federation can be implemented using static and dynamic approaches. For static one method of encryption, pseudo identity and proxy signature can be used. For dynamic approach an on demand method of provisioning is desirable. At any point of time during the cloud service usage, if the customer requires more resources that are not available with the current provider then it can be requested from others. At this moment, on time service is considered, the requested user is forwarded to other providers system for which the user identity needs to be verified by the new provider by using SAML V2 identity management. For multiple request and service usage the log records are maintained with the provider. These log records maintain the user transaction details along with the login and logout time. User access pattern of service is recorded and based on the user’s previous transaction history, new access pattern is defined. 4. Conclusion Security and privacy issue of user identities has been identified as active area of research. Various non cloud systems are identified and discussed. Identity management issue is crucial for cloud computing environment. The remote access and management of user credentials are creates privacy concerns. Many approaches are available, but we presented a simple and trust based scheme for the cloud computing application and service. 5. References [1] Kathy Bergsma (University of Florida) on September 23, 2009. [2] Lothar Fritsch & Kristin Skeide Fuglerud & Ivar Solheim “Towards inclusive identity management”, October 2010, Springerlink.com. [3] David G. W. Birch, “Psychic ID: A blueprint for a modern national identity scheme”, Identity Journal Limited 2009. [4] Sébastien Canard · Eric Malville · Jacques Traoré, “A client-side approach for privacy-preserving identity federation”, Identity Journal Limited 2009. [5] Yang Zhang and Jun-Liang Chen, “A Delegation Solution for Universal Identity Management in SOA”, Computing, Vol 4, No 1, January-March 2011. [6] R. Sánchez et al., “Enhancing Privacy and Dynamic Federation in IdM for Consumer Cloud Computing”, 96 IEEE Transactions on Consumer Electronics, Vol. 58, No. 1, February 2012. [7] Rohit Ranchal et al, “Protection of Identity Information in Cloud Computing without Trusted Third Party”, 29th IEEE International Symposium on Reliable Distributed Systems, 2010. [8] Carl A. Gunter et al,“ Experience-Based Access Management, A Life-Cycle Framework for Identity and Access Management Systems” IEEE Computer and Reliability Societies,2011. [9] David W.et al, “Attribute Aggregation in Federated Identity Management”,IEEE Computer Society, May 2009. [10] Paul Madsen and Hiroki Itoh, “Challenges To Supporting Federated Assurance”, IEEE Computer Society, 2009. [11] Alessandro Acquisti, “Identity M anagement, Privacy, and Price D iscrimination”, IEEE Computer Society, 2008. [12] Daniel J.Weitzner, “In Search of Manageable Identity Systems” IEEE Computer Society, 2006. 19